Deck 3: Application and Networking-Based Attacks

ملء الشاشة (f)
exit full mode
سؤال
Because of the minor role it plays, DNS is never the focus of attacks.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which SQL injection statement example below could be used to discover the name of the table?

A)whatever%20 AND 1=(SELECT COUNT(*) FROM tabname); --
B)whatever' AND 1=(SELECT COUNT(*) FROM tabname); --
C)whatever; AND 1=(SELECT COUNT(*) FROM tabname); --
D)whatever%; AND 1=(SELECT COUNT(*) FROM tabname); --
سؤال
What language below is used to view and manipulate data that is stored in a relational database?

A)C
B)DQL
C)SQL
D)ISL
سؤال
XSS attacks occur when an attacker takes advantage of web applications that accept user input without validating it and then present it back to the user.​
سؤال
Which type of attack below is similar to a passive man-in-the-middle attack?

A)replay
B)hijacking
C)denial
D)buffer overflow
سؤال
Choose the SQL injection statement example below that could be used to find specific users:

A)whatever' OR full_name = '%Mia%'
B)whatever' OR full_name IS '%Mia%'
C)whatever' OR full_name LIKE '%Mia%'
D)whatever' OR full_name equals '%Mia%'
سؤال
The default root directory of the Microsoft Internet Information Services (IIS) Web server is located at which directory below?

A)/var/www
B)C:\Inetpub\ wwwroot
C)/var/html
D)C:\wwwroot
سؤال
On a compromised computer, you have found that a user without administrative privileges was able to perform a task limited to only administrative accounts. What type of exploit has occurred?​

A)​Privilege escalation
B)​DNS cache poisoning
C)​ARP poisoning
D)​Man-in-the-middle
سؤال
Although traditional network security devices can block traditional network attacks, they cannot always block Web application attacks.
سؤال
ARP poisoning is successful because there are few authentication procedures to verify ARP requests and replies.
سؤال
Because the XSS is a widely known attack, the number of Web sites that are vulnerable is very small.
سؤال
HTML uses which option below within embedded brackets (< >) causing a web browser to display text in a specific format?

A)​blocks
B)​marks
C)​taps
D)​tags
سؤال
To what specific directory are users generally restricted to on a web server?

A)top
B)base
C)root
D)tap
سؤال
What portion of the HTTP packet consists of fields that contain information about the characteristics of the data being transmitted?

A)HTTP header
B)HTML header
C)XML header
D)SSL header
سؤال
Attacks that take place against web based services are considered to be what type of attack?

A)client-side
B)hybrid
C)server-side
D)relationship
سؤال
A user has become compromised as a result of visiting a specific web page, without clicking on any kind of content. What type of attack has occurred?

A)buffer overflow
B)drive-by-download
C)denial of service
D)stack underflow
سؤال
Which SQL statement represents a SQL injection attempt to determine the names of different fields in a database?

A)whatever AND email IS NULL; --
B)whatever; AND email IS NULL; --
C)whatever" AND email IS NULL; --
D)whatever' AND email IS NULL; --
سؤال
How can an attacker substitute a DNS address so that a computer is automatically redirected to another device?

A)DNS poisoning
B)Phishing
C)DNS marking
D)DNS overloading
سؤال
The exchange of information among DNS servers regarding configured zones is known as:

A)resource request
B)zone disarticulation
C)zone transfer
D)zone removal
سؤال
Which SQL injection statement can be used to erase an entire database table?

A)whatever'; DROP TABLE members; --
B)whatever'; DELETE TABLE members; --
C)whatever'; UPDATE TABLE members; --
D)whatever'; RENAME TABLE members; --
سؤال
What language below is for the transport and storage of data, with the focus on what the data is?

A)​XML
B)​HTML
C)​SGML
D)​SML
سؤال
What language below is designed to display data, with a primary focus on how the data looks?

A)XML
B)HTML
C)SGML
D)ISL
سؤال
Match the following terms to the appropriate definitions.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
​A form of verification used when accessing a secure web application
سؤال
Match the following terms to the appropriate definitions.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
​An attack that uses the Internet Control Message Protocol (ICMP) to flood a victim with packets.
سؤال
When TCP/IP was developed, the host table concept was expanded into a hierarchical name system for matching computer names and numbers using this service:

A)HTTP
B)NSDB
C)URNS
D)DNS
سؤال
Match the following terms to the appropriate definitions.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
Injecting and executing commands to execute on a server​
سؤال
Match the following terms to the appropriate definitions.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
​Part of the TCP/IP protocol for determining the MAC address based on the IP address.
سؤال
Match the following terms to the appropriate definitions.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
​Another name for locally shared object (LSO)
سؤال
Match the following terms to the appropriate definitions.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
An attack that occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer​
سؤال
A web browser makes a request for a web page using the ________________.
سؤال
Match the following terms to the appropriate definitions.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
​An attack that broadcasts a ping request to computers yet changes the address so that all responses are sent to the victim.
سؤال
Ethernet LAN networks utilize the physical _________________ address to send packets.​
سؤال
Select below the string of characters that can be used to traverse up one directory level from the root directory:

A);/
B)./
C)%20/
D)../
سؤال
Match the following terms to the appropriate definitions.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
An attack that corrupts the ARP cache​
سؤال
Match the following terms to the appropriate definitions.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
​An attack that substitutes DNS addresses so that the computer is automatically redirected to an attacker's device.
سؤال
The predecessor to today's Internet was a network known as ____________________.
سؤال
Match the following terms to the appropriate definitions.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
​An attack that injects scripts into a web application server to direct attacks at clients.
سؤال
A(n) ____________________ cookie is stored in Random Access Memory (RAM), instead of on the hard drive, and only lasts for the duration of visiting the Web site.
سؤال
An attack in which the attacker attempts to impersonate the user by using his or her session token is known as:

A)Session replay
B)Session spoofing
C)Session hijacking
D)Session blocking
سؤال
A TCP/IP communication begins with a control message, known as a ________________, to initialize the connection.​
Match the following terms to the appropriate definitions.​
a.​Address Resolution Protocol (ARP)
b.ARP Poisoning​
c.​Buffer overflow attack
d.Command injection​
e.​Cross-site scripting (XSS)
سؤال
What is the goal of a directory traversal attack?​
سؤال
What is a cookie, and how is it used?​
سؤال
In a drive-by download attack, provide an example of how an attacker might avoid visual detection.​
سؤال
How does a cross-site scripting (XSS) attack work?
سؤال
List three of the most common Web application attacks.
سؤال
What are zero-day attacks?​
سؤال
Explain the HTTP header referrer attack.
سؤال
Describe the two types of privilege escalation.
سؤال
How does ARP poisoning take advantage of the use of ARP?​
سؤال
How does a SYN flood attack work?​
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 3: Application and Networking-Based Attacks
1
Because of the minor role it plays, DNS is never the focus of attacks.
False
2
Which SQL injection statement example below could be used to discover the name of the table?

A)whatever%20 AND 1=(SELECT COUNT(*) FROM tabname); --
B)whatever' AND 1=(SELECT COUNT(*) FROM tabname); --
C)whatever; AND 1=(SELECT COUNT(*) FROM tabname); --
D)whatever%; AND 1=(SELECT COUNT(*) FROM tabname); --
B
3
What language below is used to view and manipulate data that is stored in a relational database?

A)C
B)DQL
C)SQL
D)ISL
C
4
XSS attacks occur when an attacker takes advantage of web applications that accept user input without validating it and then present it back to the user.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which type of attack below is similar to a passive man-in-the-middle attack?

A)replay
B)hijacking
C)denial
D)buffer overflow
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
Choose the SQL injection statement example below that could be used to find specific users:

A)whatever' OR full_name = '%Mia%'
B)whatever' OR full_name IS '%Mia%'
C)whatever' OR full_name LIKE '%Mia%'
D)whatever' OR full_name equals '%Mia%'
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
The default root directory of the Microsoft Internet Information Services (IIS) Web server is located at which directory below?

A)/var/www
B)C:\Inetpub\ wwwroot
C)/var/html
D)C:\wwwroot
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
On a compromised computer, you have found that a user without administrative privileges was able to perform a task limited to only administrative accounts. What type of exploit has occurred?​

A)​Privilege escalation
B)​DNS cache poisoning
C)​ARP poisoning
D)​Man-in-the-middle
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
Although traditional network security devices can block traditional network attacks, they cannot always block Web application attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
ARP poisoning is successful because there are few authentication procedures to verify ARP requests and replies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
Because the XSS is a widely known attack, the number of Web sites that are vulnerable is very small.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
HTML uses which option below within embedded brackets (< >) causing a web browser to display text in a specific format?

A)​blocks
B)​marks
C)​taps
D)​tags
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
To what specific directory are users generally restricted to on a web server?

A)top
B)base
C)root
D)tap
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
What portion of the HTTP packet consists of fields that contain information about the characteristics of the data being transmitted?

A)HTTP header
B)HTML header
C)XML header
D)SSL header
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
Attacks that take place against web based services are considered to be what type of attack?

A)client-side
B)hybrid
C)server-side
D)relationship
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
A user has become compromised as a result of visiting a specific web page, without clicking on any kind of content. What type of attack has occurred?

A)buffer overflow
B)drive-by-download
C)denial of service
D)stack underflow
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which SQL statement represents a SQL injection attempt to determine the names of different fields in a database?

A)whatever AND email IS NULL; --
B)whatever; AND email IS NULL; --
C)whatever" AND email IS NULL; --
D)whatever' AND email IS NULL; --
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
How can an attacker substitute a DNS address so that a computer is automatically redirected to another device?

A)DNS poisoning
B)Phishing
C)DNS marking
D)DNS overloading
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
The exchange of information among DNS servers regarding configured zones is known as:

A)resource request
B)zone disarticulation
C)zone transfer
D)zone removal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which SQL injection statement can be used to erase an entire database table?

A)whatever'; DROP TABLE members; --
B)whatever'; DELETE TABLE members; --
C)whatever'; UPDATE TABLE members; --
D)whatever'; RENAME TABLE members; --
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
What language below is for the transport and storage of data, with the focus on what the data is?

A)​XML
B)​HTML
C)​SGML
D)​SML
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
What language below is designed to display data, with a primary focus on how the data looks?

A)XML
B)HTML
C)SGML
D)ISL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Match the following terms to the appropriate definitions.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
​A form of verification used when accessing a secure web application
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
Match the following terms to the appropriate definitions.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
​An attack that uses the Internet Control Message Protocol (ICMP) to flood a victim with packets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
When TCP/IP was developed, the host table concept was expanded into a hierarchical name system for matching computer names and numbers using this service:

A)HTTP
B)NSDB
C)URNS
D)DNS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
Match the following terms to the appropriate definitions.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
Injecting and executing commands to execute on a server​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Match the following terms to the appropriate definitions.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
​Part of the TCP/IP protocol for determining the MAC address based on the IP address.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
Match the following terms to the appropriate definitions.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
​Another name for locally shared object (LSO)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
Match the following terms to the appropriate definitions.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
An attack that occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
A web browser makes a request for a web page using the ________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
Match the following terms to the appropriate definitions.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
​An attack that broadcasts a ping request to computers yet changes the address so that all responses are sent to the victim.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
Ethernet LAN networks utilize the physical _________________ address to send packets.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
Select below the string of characters that can be used to traverse up one directory level from the root directory:

A);/
B)./
C)%20/
D)../
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
Match the following terms to the appropriate definitions.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
An attack that corrupts the ARP cache​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
Match the following terms to the appropriate definitions.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
​An attack that substitutes DNS addresses so that the computer is automatically redirected to an attacker's device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
The predecessor to today's Internet was a network known as ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
Match the following terms to the appropriate definitions.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
​An attack that injects scripts into a web application server to direct attacks at clients.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
A(n) ____________________ cookie is stored in Random Access Memory (RAM), instead of on the hard drive, and only lasts for the duration of visiting the Web site.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
An attack in which the attacker attempts to impersonate the user by using his or her session token is known as:

A)Session replay
B)Session spoofing
C)Session hijacking
D)Session blocking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
A TCP/IP communication begins with a control message, known as a ________________, to initialize the connection.​
Match the following terms to the appropriate definitions.​
a.​Address Resolution Protocol (ARP)
b.ARP Poisoning​
c.​Buffer overflow attack
d.Command injection​
e.​Cross-site scripting (XSS)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
What is the goal of a directory traversal attack?​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
What is a cookie, and how is it used?​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
In a drive-by download attack, provide an example of how an attacker might avoid visual detection.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
How does a cross-site scripting (XSS) attack work?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
List three of the most common Web application attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
What are zero-day attacks?​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
Explain the HTTP header referrer attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
Describe the two types of privilege escalation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
How does ARP poisoning take advantage of the use of ARP?​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
How does a SYN flood attack work?​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.